Gitblit 1.9.3 is vulnerable to local file inclusion via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).
View the template here CVE-2022-31268.yaml
echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-31268.yaml
References: